IT Management  >   Systems Operations  >   Security  >   AAA  >   Authorization  >  

Web Access Control

RSS Feed    Add to Google    Add to My Yahoo!
Web Access Control Reports
 
Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

Turn Identity into a Business Enabler, Not an IT Bottleneck
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper highlights the benefits of a federated identity service that can help you to improve efficiencies, reduce risks, and maximize ROI.
Posted: 15 Apr 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Privileged Identity Management Trends from Q1 2014
sponsored by CA Technologies.
WHITE PAPER: This Forrester Research, Inc. report highlights key trends that point to privileged identity management as a must-have security strategy, and highlights the top vendors who met an 18-item requirements list.
Posted: 19 Jun 2014 | Published: 28 Feb 2014

CA Technologies.

Citrix XenMobile and Cisco ISE Integration
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
Posted: 21 Mar 2014 | Published: 21 Mar 2014

Cisco Systems, Inc and Citrix

Encrypt Your Virtual and Cloud-Based Data Centers with SafeNet ProtectV
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper introduces a solution that offers persistent, secured storage for structured and unstructured data, wherever it resides.
Posted: 11 Dec 2014 | Published: 15 Aug 2013

SafeNet, Inc.

Verity Credit Union Streamlines Application Access, Reduces Helpdesk Costs and Improves Customer Service
sponsored by Imprivata
WHITE PAPER: This case study shares one credit union's experience with an authentication solution that helped it efficiently manage user access across all applications without hindering productivity or adding costs.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

Identity Manager: Reducing Risk, Raising Governance and Improving the Bottom Line
sponsored by NetIQ
WHITE PAPER: This resource highlights the major reason behind compliance challenges, and offers a solution that provides a real-time, holistic view of your organization's posture to improve data accuracies and ensure business stability.
Posted: 28 Mar 2014 | Published: 31 Dec 2013

NetIQ

Chalk Talk: Simplify User Access with NetIQ Solutions
sponsored by NetIQ
WHITE PAPER: View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications.
Posted: 01 Apr 2014 | Published: 01 Apr 2014

NetIQ
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement